pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +2 -4
- pulumi_vault/terraformcloud/secret_role.py +2 -4
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -348,7 +348,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
348
348
|
|
349
349
|
## Example Usage
|
350
350
|
|
351
|
-
<!--Start PulumiCodeChooser -->
|
352
351
|
```python
|
353
352
|
import pulumi
|
354
353
|
import pulumi_vault as vault
|
@@ -364,7 +363,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
364
363
|
issuer="api",
|
365
364
|
disable_iss_validation=True)
|
366
365
|
```
|
367
|
-
<!--End PulumiCodeChooser -->
|
368
366
|
|
369
367
|
## Import
|
370
368
|
|
@@ -402,7 +400,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
402
400
|
|
403
401
|
## Example Usage
|
404
402
|
|
405
|
-
<!--Start PulumiCodeChooser -->
|
406
403
|
```python
|
407
404
|
import pulumi
|
408
405
|
import pulumi_vault as vault
|
@@ -418,7 +415,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
418
415
|
issuer="api",
|
419
416
|
disable_iss_validation=True)
|
420
417
|
```
|
421
|
-
<!--End PulumiCodeChooser -->
|
422
418
|
|
423
419
|
## Import
|
424
420
|
|
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
|
|
47
47
|
The value should not contain leading or trailing forward slashes.
|
48
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
49
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
51
|
-
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
58
|
-
Its current value will be referenced at renewal time.
|
59
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
61
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
62
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
63
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
64
|
-
token generated using this role should never expire. The token should be renewed within the
|
65
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
66
|
-
value of this field. Specified in seconds.
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
68
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
51
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
52
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
53
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
54
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
55
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
69
57
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
70
|
-
:param pulumi.Input[str] token_type: The type of token
|
71
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
72
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
73
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
74
|
-
requests a different type at generation time.
|
58
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
75
59
|
"""
|
76
60
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
77
61
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
@@ -199,9 +183,7 @@ class AuthBackendRoleArgs:
|
|
199
183
|
@pulumi.getter(name="tokenBoundCidrs")
|
200
184
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
201
185
|
"""
|
202
|
-
|
203
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
204
|
-
as well.
|
186
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
205
187
|
"""
|
206
188
|
return pulumi.get(self, "token_bound_cidrs")
|
207
189
|
|
@@ -213,10 +195,7 @@ class AuthBackendRoleArgs:
|
|
213
195
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
214
196
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
215
197
|
"""
|
216
|
-
|
217
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
218
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
219
|
-
`token_max_ttl` would otherwise allow a renewal.
|
198
|
+
Generated Token's Explicit Maximum TTL in seconds
|
220
199
|
"""
|
221
200
|
return pulumi.get(self, "token_explicit_max_ttl")
|
222
201
|
|
@@ -228,8 +207,7 @@ class AuthBackendRoleArgs:
|
|
228
207
|
@pulumi.getter(name="tokenMaxTtl")
|
229
208
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
230
209
|
"""
|
231
|
-
The maximum lifetime
|
232
|
-
Its current value will be referenced at renewal time.
|
210
|
+
The maximum lifetime of the generated token
|
233
211
|
"""
|
234
212
|
return pulumi.get(self, "token_max_ttl")
|
235
213
|
|
@@ -241,8 +219,7 @@ class AuthBackendRoleArgs:
|
|
241
219
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
242
220
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
243
221
|
"""
|
244
|
-
If
|
245
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
222
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
246
223
|
"""
|
247
224
|
return pulumi.get(self, "token_no_default_policy")
|
248
225
|
|
@@ -254,8 +231,7 @@ class AuthBackendRoleArgs:
|
|
254
231
|
@pulumi.getter(name="tokenNumUses")
|
255
232
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
256
233
|
"""
|
257
|
-
The
|
258
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
234
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
259
235
|
"""
|
260
236
|
return pulumi.get(self, "token_num_uses")
|
261
237
|
|
@@ -267,10 +243,7 @@ class AuthBackendRoleArgs:
|
|
267
243
|
@pulumi.getter(name="tokenPeriod")
|
268
244
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
269
245
|
"""
|
270
|
-
|
271
|
-
token generated using this role should never expire. The token should be renewed within the
|
272
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
273
|
-
value of this field. Specified in seconds.
|
246
|
+
Generated Token's Period
|
274
247
|
"""
|
275
248
|
return pulumi.get(self, "token_period")
|
276
249
|
|
@@ -282,8 +255,7 @@ class AuthBackendRoleArgs:
|
|
282
255
|
@pulumi.getter(name="tokenPolicies")
|
283
256
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
284
257
|
"""
|
285
|
-
|
286
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
258
|
+
Generated Token's Policies
|
287
259
|
"""
|
288
260
|
return pulumi.get(self, "token_policies")
|
289
261
|
|
@@ -307,11 +279,7 @@ class AuthBackendRoleArgs:
|
|
307
279
|
@pulumi.getter(name="tokenType")
|
308
280
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
309
281
|
"""
|
310
|
-
The type of token
|
311
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
312
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
313
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
314
|
-
requests a different type at generation time.
|
282
|
+
The type of token to generate, service or batch
|
315
283
|
"""
|
316
284
|
return pulumi.get(self, "token_type")
|
317
285
|
|
@@ -356,31 +324,15 @@ class _AuthBackendRoleState:
|
|
356
324
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
357
325
|
*Available only for Vault Enterprise*.
|
358
326
|
:param pulumi.Input[str] role_name: Name of the role.
|
359
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
360
|
-
|
361
|
-
|
362
|
-
:param pulumi.Input[
|
363
|
-
|
364
|
-
|
365
|
-
|
366
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
367
|
-
Its current value will be referenced at renewal time.
|
368
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
369
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
370
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
371
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
372
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
373
|
-
token generated using this role should never expire. The token should be renewed within the
|
374
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
375
|
-
value of this field. Specified in seconds.
|
376
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
377
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
327
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
328
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
329
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
330
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
331
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
332
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
333
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
378
334
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
379
|
-
:param pulumi.Input[str] token_type: The type of token
|
380
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
381
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
382
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
383
|
-
requests a different type at generation time.
|
335
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
384
336
|
"""
|
385
337
|
if alias_name_source is not None:
|
386
338
|
pulumi.set(__self__, "alias_name_source", alias_name_source)
|
@@ -511,9 +463,7 @@ class _AuthBackendRoleState:
|
|
511
463
|
@pulumi.getter(name="tokenBoundCidrs")
|
512
464
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
513
465
|
"""
|
514
|
-
|
515
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
516
|
-
as well.
|
466
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
517
467
|
"""
|
518
468
|
return pulumi.get(self, "token_bound_cidrs")
|
519
469
|
|
@@ -525,10 +475,7 @@ class _AuthBackendRoleState:
|
|
525
475
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
526
476
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
527
477
|
"""
|
528
|
-
|
529
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
530
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
531
|
-
`token_max_ttl` would otherwise allow a renewal.
|
478
|
+
Generated Token's Explicit Maximum TTL in seconds
|
532
479
|
"""
|
533
480
|
return pulumi.get(self, "token_explicit_max_ttl")
|
534
481
|
|
@@ -540,8 +487,7 @@ class _AuthBackendRoleState:
|
|
540
487
|
@pulumi.getter(name="tokenMaxTtl")
|
541
488
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
542
489
|
"""
|
543
|
-
The maximum lifetime
|
544
|
-
Its current value will be referenced at renewal time.
|
490
|
+
The maximum lifetime of the generated token
|
545
491
|
"""
|
546
492
|
return pulumi.get(self, "token_max_ttl")
|
547
493
|
|
@@ -553,8 +499,7 @@ class _AuthBackendRoleState:
|
|
553
499
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
554
500
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
555
501
|
"""
|
556
|
-
If
|
557
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
502
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
558
503
|
"""
|
559
504
|
return pulumi.get(self, "token_no_default_policy")
|
560
505
|
|
@@ -566,8 +511,7 @@ class _AuthBackendRoleState:
|
|
566
511
|
@pulumi.getter(name="tokenNumUses")
|
567
512
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
568
513
|
"""
|
569
|
-
The
|
570
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
514
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
571
515
|
"""
|
572
516
|
return pulumi.get(self, "token_num_uses")
|
573
517
|
|
@@ -579,10 +523,7 @@ class _AuthBackendRoleState:
|
|
579
523
|
@pulumi.getter(name="tokenPeriod")
|
580
524
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
581
525
|
"""
|
582
|
-
|
583
|
-
token generated using this role should never expire. The token should be renewed within the
|
584
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
585
|
-
value of this field. Specified in seconds.
|
526
|
+
Generated Token's Period
|
586
527
|
"""
|
587
528
|
return pulumi.get(self, "token_period")
|
588
529
|
|
@@ -594,8 +535,7 @@ class _AuthBackendRoleState:
|
|
594
535
|
@pulumi.getter(name="tokenPolicies")
|
595
536
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
596
537
|
"""
|
597
|
-
|
598
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
538
|
+
Generated Token's Policies
|
599
539
|
"""
|
600
540
|
return pulumi.get(self, "token_policies")
|
601
541
|
|
@@ -619,11 +559,7 @@ class _AuthBackendRoleState:
|
|
619
559
|
@pulumi.getter(name="tokenType")
|
620
560
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
621
561
|
"""
|
622
|
-
The type of token
|
623
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
624
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
625
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
626
|
-
requests a different type at generation time.
|
562
|
+
The type of token to generate, service or batch
|
627
563
|
"""
|
628
564
|
return pulumi.get(self, "token_type")
|
629
565
|
|
@@ -661,7 +597,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
661
597
|
|
662
598
|
## Example Usage
|
663
599
|
|
664
|
-
<!--Start PulumiCodeChooser -->
|
665
600
|
```python
|
666
601
|
import pulumi
|
667
602
|
import pulumi_vault as vault
|
@@ -680,7 +615,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
680
615
|
],
|
681
616
|
audience="vault")
|
682
617
|
```
|
683
|
-
<!--End PulumiCodeChooser -->
|
684
618
|
|
685
619
|
## Import
|
686
620
|
|
@@ -707,31 +641,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
707
641
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
708
642
|
*Available only for Vault Enterprise*.
|
709
643
|
:param pulumi.Input[str] role_name: Name of the role.
|
710
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
711
|
-
|
712
|
-
|
713
|
-
:param pulumi.Input[
|
714
|
-
|
715
|
-
|
716
|
-
|
717
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
718
|
-
Its current value will be referenced at renewal time.
|
719
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
720
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
721
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
722
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
723
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
724
|
-
token generated using this role should never expire. The token should be renewed within the
|
725
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
726
|
-
value of this field. Specified in seconds.
|
727
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
728
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
644
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
645
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
646
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
647
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
648
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
649
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
650
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
729
651
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
730
|
-
:param pulumi.Input[str] token_type: The type of token
|
731
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
732
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
733
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
734
|
-
requests a different type at generation time.
|
652
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
735
653
|
"""
|
736
654
|
...
|
737
655
|
@overload
|
@@ -746,7 +664,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
746
664
|
|
747
665
|
## Example Usage
|
748
666
|
|
749
|
-
<!--Start PulumiCodeChooser -->
|
750
667
|
```python
|
751
668
|
import pulumi
|
752
669
|
import pulumi_vault as vault
|
@@ -765,7 +682,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
765
682
|
],
|
766
683
|
audience="vault")
|
767
684
|
```
|
768
|
-
<!--End PulumiCodeChooser -->
|
769
685
|
|
770
686
|
## Import
|
771
687
|
|
@@ -885,31 +801,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
885
801
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
886
802
|
*Available only for Vault Enterprise*.
|
887
803
|
:param pulumi.Input[str] role_name: Name of the role.
|
888
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
889
|
-
|
890
|
-
|
891
|
-
:param pulumi.Input[
|
892
|
-
|
893
|
-
|
894
|
-
|
895
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
896
|
-
Its current value will be referenced at renewal time.
|
897
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
898
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
899
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
900
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
901
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
902
|
-
token generated using this role should never expire. The token should be renewed within the
|
903
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
904
|
-
value of this field. Specified in seconds.
|
905
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
906
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
804
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
805
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
806
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
807
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
808
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
809
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
810
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
907
811
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
908
|
-
:param pulumi.Input[str] token_type: The type of token
|
909
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
910
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
911
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
912
|
-
requests a different type at generation time.
|
812
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
913
813
|
"""
|
914
814
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
915
815
|
|
@@ -1001,9 +901,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1001
901
|
@pulumi.getter(name="tokenBoundCidrs")
|
1002
902
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1003
903
|
"""
|
1004
|
-
|
1005
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1006
|
-
as well.
|
904
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1007
905
|
"""
|
1008
906
|
return pulumi.get(self, "token_bound_cidrs")
|
1009
907
|
|
@@ -1011,10 +909,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1011
909
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1012
910
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1013
911
|
"""
|
1014
|
-
|
1015
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1016
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1017
|
-
`token_max_ttl` would otherwise allow a renewal.
|
912
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1018
913
|
"""
|
1019
914
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1020
915
|
|
@@ -1022,8 +917,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1022
917
|
@pulumi.getter(name="tokenMaxTtl")
|
1023
918
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1024
919
|
"""
|
1025
|
-
The maximum lifetime
|
1026
|
-
Its current value will be referenced at renewal time.
|
920
|
+
The maximum lifetime of the generated token
|
1027
921
|
"""
|
1028
922
|
return pulumi.get(self, "token_max_ttl")
|
1029
923
|
|
@@ -1031,8 +925,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1031
925
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1032
926
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1033
927
|
"""
|
1034
|
-
If
|
1035
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
928
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1036
929
|
"""
|
1037
930
|
return pulumi.get(self, "token_no_default_policy")
|
1038
931
|
|
@@ -1040,8 +933,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1040
933
|
@pulumi.getter(name="tokenNumUses")
|
1041
934
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1042
935
|
"""
|
1043
|
-
The
|
1044
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
936
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1045
937
|
"""
|
1046
938
|
return pulumi.get(self, "token_num_uses")
|
1047
939
|
|
@@ -1049,10 +941,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1049
941
|
@pulumi.getter(name="tokenPeriod")
|
1050
942
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1051
943
|
"""
|
1052
|
-
|
1053
|
-
token generated using this role should never expire. The token should be renewed within the
|
1054
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1055
|
-
value of this field. Specified in seconds.
|
944
|
+
Generated Token's Period
|
1056
945
|
"""
|
1057
946
|
return pulumi.get(self, "token_period")
|
1058
947
|
|
@@ -1060,8 +949,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1060
949
|
@pulumi.getter(name="tokenPolicies")
|
1061
950
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1062
951
|
"""
|
1063
|
-
|
1064
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
952
|
+
Generated Token's Policies
|
1065
953
|
"""
|
1066
954
|
return pulumi.get(self, "token_policies")
|
1067
955
|
|
@@ -1077,11 +965,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1077
965
|
@pulumi.getter(name="tokenType")
|
1078
966
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1079
967
|
"""
|
1080
|
-
The type of token
|
1081
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1082
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1083
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1084
|
-
requests a different type at generation time.
|
968
|
+
The type of token to generate, service or batch
|
1085
969
|
"""
|
1086
970
|
return pulumi.get(self, "token_type")
|
1087
971
|
|
@@ -180,20 +180,21 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
180
180
|
"""
|
181
181
|
## Example Usage
|
182
182
|
|
183
|
-
<!--Start PulumiCodeChooser -->
|
184
183
|
```python
|
185
184
|
import pulumi
|
185
|
+
import pulumi_std as std
|
186
186
|
import pulumi_vault as vault
|
187
187
|
|
188
188
|
config = vault.kubernetes.SecretBackend("config",
|
189
189
|
path="kubernetes",
|
190
190
|
description="kubernetes secrets engine description",
|
191
191
|
kubernetes_host="https://127.0.0.1:61233",
|
192
|
-
kubernetes_ca_cert=
|
193
|
-
service_account_jwt=
|
192
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
193
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
194
194
|
disable_local_ca_jwt=False)
|
195
195
|
role = vault.kubernetes.SecretBackendRole("role",
|
196
196
|
backend=config.path,
|
197
|
+
name="service-account-name-role",
|
197
198
|
allowed_kubernetes_namespaces=["*"],
|
198
199
|
token_max_ttl=43200,
|
199
200
|
token_default_ttl=21600,
|
@@ -212,7 +213,6 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
212
213
|
cluster_role_binding=False,
|
213
214
|
ttl="1h")
|
214
215
|
```
|
215
|
-
<!--End PulumiCodeChooser -->
|
216
216
|
|
217
217
|
|
218
218
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -267,20 +267,21 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
267
267
|
"""
|
268
268
|
## Example Usage
|
269
269
|
|
270
|
-
<!--Start PulumiCodeChooser -->
|
271
270
|
```python
|
272
271
|
import pulumi
|
272
|
+
import pulumi_std as std
|
273
273
|
import pulumi_vault as vault
|
274
274
|
|
275
275
|
config = vault.kubernetes.SecretBackend("config",
|
276
276
|
path="kubernetes",
|
277
277
|
description="kubernetes secrets engine description",
|
278
278
|
kubernetes_host="https://127.0.0.1:61233",
|
279
|
-
kubernetes_ca_cert=
|
280
|
-
service_account_jwt=
|
279
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
280
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
281
281
|
disable_local_ca_jwt=False)
|
282
282
|
role = vault.kubernetes.SecretBackendRole("role",
|
283
283
|
backend=config.path,
|
284
|
+
name="service-account-name-role",
|
284
285
|
allowed_kubernetes_namespaces=["*"],
|
285
286
|
token_max_ttl=43200,
|
286
287
|
token_default_ttl=21600,
|
@@ -299,7 +300,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
299
300
|
cluster_role_binding=False,
|
300
301
|
ttl="1h")
|
301
302
|
```
|
302
|
-
<!--End PulumiCodeChooser -->
|
303
303
|
|
304
304
|
|
305
305
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -623,9 +623,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
-
<!--Start PulumiCodeChooser -->
|
627
626
|
```python
|
628
627
|
import pulumi
|
628
|
+
import pulumi_std as std
|
629
629
|
import pulumi_vault as vault
|
630
630
|
|
631
631
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -634,11 +634,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
634
634
|
default_lease_ttl_seconds=43200,
|
635
635
|
max_lease_ttl_seconds=86400,
|
636
636
|
kubernetes_host="https://127.0.0.1:61233",
|
637
|
-
kubernetes_ca_cert=
|
638
|
-
service_account_jwt=
|
637
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
638
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
639
639
|
disable_local_ca_jwt=False)
|
640
640
|
```
|
641
|
-
<!--End PulumiCodeChooser -->
|
642
641
|
|
643
642
|
## Import
|
644
643
|
|
@@ -687,9 +686,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
687
686
|
"""
|
688
687
|
## Example Usage
|
689
688
|
|
690
|
-
<!--Start PulumiCodeChooser -->
|
691
689
|
```python
|
692
690
|
import pulumi
|
691
|
+
import pulumi_std as std
|
693
692
|
import pulumi_vault as vault
|
694
693
|
|
695
694
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -698,11 +697,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
698
697
|
default_lease_ttl_seconds=43200,
|
699
698
|
max_lease_ttl_seconds=86400,
|
700
699
|
kubernetes_host="https://127.0.0.1:61233",
|
701
|
-
kubernetes_ca_cert=
|
702
|
-
service_account_jwt=
|
700
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
701
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
703
702
|
disable_local_ca_jwt=False)
|
704
703
|
```
|
705
|
-
<!--End PulumiCodeChooser -->
|
706
704
|
|
707
705
|
## Import
|
708
706
|
|